ServerConnection.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622
  1. /**
  2. * @file ServerConnection.c
  3. * @author Ambroz Bizjak <ambrop7@gmail.com>
  4. *
  5. * @section LICENSE
  6. *
  7. * This file is part of BadVPN.
  8. *
  9. * BadVPN is free software: you can redistribute it and/or modify
  10. * it under the terms of the GNU General Public License version 2
  11. * as published by the Free Software Foundation.
  12. *
  13. * BadVPN is distributed in the hope that it will be useful,
  14. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  15. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  16. * GNU General Public License for more details.
  17. *
  18. * You should have received a copy of the GNU General Public License along
  19. * with this program; if not, write to the Free Software Foundation, Inc.,
  20. * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
  21. */
  22. #include <stdio.h>
  23. #include <misc/debug.h>
  24. #include <base/BLog.h>
  25. #include <server_connection/ServerConnection.h>
  26. #include <generated/blog_channel_ServerConnection.h>
  27. #define STATE_CONNECTING 1
  28. #define STATE_WAITINIT 2
  29. #define STATE_COMPLETE 3
  30. #define COMPONENT_SOURCE 1
  31. #define COMPONENT_SINK 2
  32. #define COMPONENT_DECODER 3
  33. static void report_error (ServerConnection *o);
  34. static void connect_handler (ServerConnection *o, int event);
  35. static void pending_handler (ServerConnection *o);
  36. static SECStatus client_auth_data_callback (ServerConnection *o, PRFileDesc *fd, CERTDistNames *caNames, CERTCertificate **pRetCert, SECKEYPrivateKey **pRetKey);
  37. static void error_handler (ServerConnection *o, int component, int code);
  38. static void input_handler_send (ServerConnection *o, uint8_t *data, int data_len);
  39. static void packet_hello (ServerConnection *o, uint8_t *data, int data_len);
  40. static void packet_newclient (ServerConnection *o, uint8_t *data, int data_len);
  41. static void packet_endclient (ServerConnection *o, uint8_t *data, int data_len);
  42. static void packet_inmsg (ServerConnection *o, uint8_t *data, int data_len);
  43. static int start_packet (ServerConnection *o, void **data, int len);
  44. static void end_packet (ServerConnection *o, uint8_t type);
  45. void report_error (ServerConnection *o)
  46. {
  47. DEBUGERROR(&o->d_err, o->handler_error(o->user))
  48. }
  49. void connect_handler (ServerConnection *o, int event)
  50. {
  51. ASSERT(o->state == STATE_CONNECTING)
  52. ASSERT(event == BSOCKET_CONNECT)
  53. DebugObject_Access(&o->d_obj);
  54. // remove connect event handler
  55. BSocket_RemoveEventHandler(&o->sock, BSOCKET_CONNECT);
  56. // check connection attempt result
  57. int res = BSocket_GetConnectResult(&o->sock);
  58. if (res != 0) {
  59. BLog(BLOG_ERROR, "connection failed (BSocket error %d)", res);
  60. goto fail0;
  61. }
  62. BLog(BLOG_NOTICE, "connected");
  63. if (o->have_ssl) {
  64. // create BSocket NSPR file descriptor
  65. BSocketPRFileDesc_Create(&o->bottom_prfd, &o->sock);
  66. // create SSL file descriptor from the socket's BSocketPRFileDesc
  67. if (!(o->ssl_prfd = SSL_ImportFD(NULL, &o->bottom_prfd))) {
  68. BLog(BLOG_ERROR, "SSL_ImportFD failed");
  69. ASSERT_FORCE(PR_Close(&o->bottom_prfd) == PR_SUCCESS)
  70. goto fail0;
  71. }
  72. // set client mode
  73. if (SSL_ResetHandshake(o->ssl_prfd, PR_FALSE) != SECSuccess) {
  74. BLog(BLOG_ERROR, "SSL_ResetHandshake failed");
  75. goto fail1;
  76. }
  77. // set server name
  78. if (SSL_SetURL(o->ssl_prfd, o->server_name) != SECSuccess) {
  79. BLog(BLOG_ERROR, "SSL_SetURL failed");
  80. goto fail1;
  81. }
  82. // set client certificate callback
  83. if (SSL_GetClientAuthDataHook(o->ssl_prfd, (SSLGetClientAuthData)client_auth_data_callback, o) != SECSuccess) {
  84. BLog(BLOG_ERROR, "SSL_GetClientAuthDataHook failed");
  85. goto fail1;
  86. }
  87. // init BPRFileDesc
  88. BPRFileDesc_Init(&o->ssl_bprfd, o->ssl_prfd);
  89. }
  90. // init error domain
  91. FlowErrorDomain_Init(&o->ioerrdomain, (FlowErrorDomain_handler)error_handler, o);
  92. // init input chain
  93. StreamRecvInterface *source_interface;
  94. if (o->have_ssl) {
  95. PRStreamSource_Init(&o->input_source.ssl, FlowErrorReporter_Create(&o->ioerrdomain, COMPONENT_SOURCE), &o->ssl_bprfd, BReactor_PendingGroup(o->reactor));
  96. source_interface = PRStreamSource_GetOutput(&o->input_source.ssl);
  97. } else {
  98. StreamSocketSource_Init(&o->input_source.plain, FlowErrorReporter_Create(&o->ioerrdomain, COMPONENT_SOURCE), &o->sock, BReactor_PendingGroup(o->reactor));
  99. source_interface = StreamSocketSource_GetOutput(&o->input_source.plain);
  100. }
  101. PacketPassInterface_Init(&o->input_interface, SC_MAX_ENC, (PacketPassInterface_handler_send)input_handler_send, o, BReactor_PendingGroup(o->reactor));
  102. if (!PacketProtoDecoder_Init(&o->input_decoder, FlowErrorReporter_Create(&o->ioerrdomain, COMPONENT_DECODER), source_interface, &o->input_interface,BReactor_PendingGroup(o->reactor))) {
  103. BLog(BLOG_ERROR, "PacketProtoDecoder_Init failed");
  104. goto fail2;
  105. }
  106. // set job to send hello
  107. // this needs to be in here because hello sending must be done after sending started (so we can write into the send buffer),
  108. // but before receiving started (so we don't get into conflict with the user sending packets)
  109. BPending_Init(&o->start_job, BReactor_PendingGroup(o->reactor), (BPending_handler)pending_handler, o);
  110. BPending_Set(&o->start_job);
  111. // init keepalive output branch
  112. SCKeepaliveSource_Init(&o->output_ka_zero, BReactor_PendingGroup(o->reactor));
  113. PacketProtoEncoder_Init(&o->output_ka_encoder, SCKeepaliveSource_GetOutput(&o->output_ka_zero), BReactor_PendingGroup(o->reactor));
  114. // init output common
  115. // init sink
  116. StreamPassInterface *sink_interface;
  117. if (o->have_ssl) {
  118. PRStreamSink_Init(&o->output_sink.ssl, FlowErrorReporter_Create(&o->ioerrdomain, COMPONENT_SINK), &o->ssl_bprfd, BReactor_PendingGroup(o->reactor));
  119. sink_interface = PRStreamSink_GetInput(&o->output_sink.ssl);
  120. } else {
  121. StreamSocketSink_Init(&o->output_sink.plain, FlowErrorReporter_Create(&o->ioerrdomain, COMPONENT_SINK), &o->sock, BReactor_PendingGroup(o->reactor));
  122. sink_interface = StreamSocketSink_GetInput(&o->output_sink.plain);
  123. }
  124. // init sender
  125. PacketStreamSender_Init(&o->output_sender, sink_interface, PACKETPROTO_ENCLEN(SC_MAX_ENC), BReactor_PendingGroup(o->reactor));
  126. // init keepalives
  127. if (!KeepaliveIO_Init(&o->output_keepaliveio, o->reactor, PacketStreamSender_GetInput(&o->output_sender), PacketProtoEncoder_GetOutput(&o->output_ka_encoder), o->keepalive_interval)) {
  128. BLog(BLOG_ERROR, "KeepaliveIO_Init failed");
  129. goto fail3;
  130. }
  131. // init queue
  132. PacketPassPriorityQueue_Init(&o->output_queue, KeepaliveIO_GetInput(&o->output_keepaliveio), BReactor_PendingGroup(o->reactor), 0);
  133. // init output local flow
  134. // init queue flow
  135. PacketPassPriorityQueueFlow_Init(&o->output_local_qflow, &o->output_queue, 0);
  136. // init PacketProtoFlow
  137. if (!PacketProtoFlow_Init(&o->output_local_oflow, SC_MAX_ENC, o->buffer_size, PacketPassPriorityQueueFlow_GetInput(&o->output_local_qflow), BReactor_PendingGroup(o->reactor))) {
  138. BLog(BLOG_ERROR, "PacketProtoFlow_Init failed");
  139. goto fail4;
  140. }
  141. o->output_local_if = PacketProtoFlow_GetInput(&o->output_local_oflow);
  142. // have no output packet
  143. o->output_local_packet_len = -1;
  144. // init output user flow
  145. PacketPassPriorityQueueFlow_Init(&o->output_user_qflow, &o->output_queue, 1);
  146. // update state
  147. o->state = STATE_WAITINIT;
  148. return;
  149. fail4:
  150. PacketPassPriorityQueueFlow_Free(&o->output_local_qflow);
  151. // free output common
  152. PacketPassPriorityQueue_Free(&o->output_queue);
  153. KeepaliveIO_Free(&o->output_keepaliveio);
  154. fail3:
  155. PacketStreamSender_Free(&o->output_sender);
  156. if (o->have_ssl) {
  157. PRStreamSink_Free(&o->output_sink.ssl);
  158. } else {
  159. StreamSocketSink_Free(&o->output_sink.plain);
  160. }
  161. // free output keep-alive branch
  162. PacketProtoEncoder_Free(&o->output_ka_encoder);
  163. SCKeepaliveSource_Free(&o->output_ka_zero);
  164. // free job
  165. BPending_Free(&o->start_job);
  166. // free input
  167. PacketProtoDecoder_Free(&o->input_decoder);
  168. fail2:
  169. PacketPassInterface_Free(&o->input_interface);
  170. if (o->have_ssl) {
  171. PRStreamSource_Free(&o->input_source.ssl);
  172. } else {
  173. StreamSocketSource_Free(&o->input_source.plain);
  174. }
  175. // free SSL
  176. if (o->have_ssl) {
  177. BPRFileDesc_Free(&o->ssl_bprfd);
  178. fail1:
  179. ASSERT_FORCE(PR_Close(o->ssl_prfd) == PR_SUCCESS)
  180. }
  181. fail0:
  182. // report error
  183. report_error(o);
  184. }
  185. void pending_handler (ServerConnection *o)
  186. {
  187. ASSERT(o->state == STATE_WAITINIT)
  188. DebugObject_Access(&o->d_obj);
  189. // send hello
  190. struct sc_client_hello *packet;
  191. if (!start_packet(o, (void **)&packet, sizeof(struct sc_client_hello))) {
  192. BLog(BLOG_ERROR, "no buffer for hello");
  193. report_error(o);
  194. return;
  195. }
  196. packet->version = htol16(SC_VERSION);
  197. end_packet(o, SCID_CLIENTHELLO);
  198. }
  199. SECStatus client_auth_data_callback (ServerConnection *o, PRFileDesc *fd, CERTDistNames *caNames, CERTCertificate **pRetCert, SECKEYPrivateKey **pRetKey)
  200. {
  201. ASSERT(o->have_ssl)
  202. DebugObject_Access(&o->d_obj);
  203. CERTCertificate *newcert;
  204. if (!(newcert = CERT_DupCertificate(o->client_cert))) {
  205. return SECFailure;
  206. }
  207. SECKEYPrivateKey *newkey;
  208. if (!(newkey = SECKEY_CopyPrivateKey(o->client_key))) {
  209. CERT_DestroyCertificate(newcert);
  210. return SECFailure;
  211. }
  212. *pRetCert = newcert;
  213. *pRetKey = newkey;
  214. return SECSuccess;
  215. }
  216. void error_handler (ServerConnection *o, int component, int code)
  217. {
  218. ASSERT(o->state >= STATE_WAITINIT)
  219. DebugObject_Access(&o->d_obj);
  220. report_error(o);
  221. return;
  222. }
  223. void input_handler_send (ServerConnection *o, uint8_t *data, int data_len)
  224. {
  225. ASSERT(o->state >= STATE_WAITINIT)
  226. ASSERT(data_len >= 0)
  227. ASSERT(data_len <= SC_MAX_ENC)
  228. DebugObject_Access(&o->d_obj);
  229. // accept packet
  230. PacketPassInterface_Done(&o->input_interface);
  231. // parse header
  232. if (data_len < sizeof(struct sc_header)) {
  233. BLog(BLOG_ERROR, "packet too short (no sc header)");
  234. report_error(o);
  235. return;
  236. }
  237. struct sc_header *header = (struct sc_header *)data;
  238. data += sizeof(*header);
  239. data_len -= sizeof(*header);
  240. uint8_t type = ltoh8(header->type);
  241. // call appropriate handler based on packet type
  242. switch (type) {
  243. case SCID_SERVERHELLO:
  244. packet_hello(o, data, data_len);
  245. return;
  246. case SCID_NEWCLIENT:
  247. packet_newclient(o, data, data_len);
  248. return;
  249. case SCID_ENDCLIENT:
  250. packet_endclient(o, data, data_len);
  251. return;
  252. case SCID_INMSG:
  253. packet_inmsg(o, data, data_len);
  254. return;
  255. default:
  256. BLog(BLOG_ERROR, "unknown packet type %d", (int)type);
  257. report_error(o);
  258. return;
  259. }
  260. }
  261. void packet_hello (ServerConnection *o, uint8_t *data, int data_len)
  262. {
  263. if (o->state != STATE_WAITINIT) {
  264. BLog(BLOG_ERROR, "hello: not expected");
  265. report_error(o);
  266. return;
  267. }
  268. if (data_len != sizeof(struct sc_server_hello)) {
  269. BLog(BLOG_ERROR, "hello: invalid length");
  270. report_error(o);
  271. return;
  272. }
  273. struct sc_server_hello *msg = (struct sc_server_hello *)data;
  274. peerid_t id = ltoh16(msg->id);
  275. // change state
  276. o->state = STATE_COMPLETE;
  277. // report
  278. o->handler_ready(o->user, id, msg->clientAddr);
  279. return;
  280. }
  281. void packet_newclient (ServerConnection *o, uint8_t *data, int data_len)
  282. {
  283. if (o->state != STATE_COMPLETE) {
  284. BLog(BLOG_ERROR, "newclient: not expected");
  285. report_error(o);
  286. return;
  287. }
  288. if (data_len < sizeof(struct sc_server_newclient) || data_len > sizeof(struct sc_server_newclient) + SCID_NEWCLIENT_MAX_CERT_LEN) {
  289. BLog(BLOG_ERROR, "newclient: invalid length");
  290. report_error(o);
  291. return;
  292. }
  293. struct sc_server_newclient *msg = (struct sc_server_newclient *)data;
  294. peerid_t id = ltoh16(msg->id);
  295. int flags = ltoh16(msg->flags);
  296. uint8_t *cert_data = (uint8_t *)msg + sizeof(struct sc_server_newclient);
  297. int cert_len = data_len - sizeof(struct sc_server_newclient);
  298. // report
  299. o->handler_newclient(o->user, id, flags, cert_data, cert_len);
  300. return;
  301. }
  302. void packet_endclient (ServerConnection *o, uint8_t *data, int data_len)
  303. {
  304. if (o->state != STATE_COMPLETE) {
  305. BLog(BLOG_ERROR, "endclient: not expected");
  306. report_error(o);
  307. return;
  308. }
  309. if (data_len != sizeof(struct sc_server_endclient)) {
  310. BLog(BLOG_ERROR, "endclient: invalid length");
  311. report_error(o);
  312. return;
  313. }
  314. struct sc_server_endclient *msg = (struct sc_server_endclient *)data;
  315. peerid_t id = ltoh16(msg->id);
  316. // report
  317. o->handler_endclient(o->user, id);
  318. return;
  319. }
  320. void packet_inmsg (ServerConnection *o, uint8_t *data, int data_len)
  321. {
  322. if (o->state != STATE_COMPLETE) {
  323. BLog(BLOG_ERROR, "inmsg: not expected");
  324. report_error(o);
  325. return;
  326. }
  327. if (data_len < sizeof(struct sc_server_inmsg)) {
  328. BLog(BLOG_ERROR, "inmsg: missing header");
  329. report_error(o);
  330. return;
  331. }
  332. if (data_len > sizeof(struct sc_server_inmsg) + SC_MAX_MSGLEN) {
  333. BLog(BLOG_ERROR, "inmsg: too long");
  334. report_error(o);
  335. return;
  336. }
  337. struct sc_server_inmsg *msg = (struct sc_server_inmsg *)data;
  338. peerid_t peer_id = ltoh16(msg->clientid);
  339. uint8_t *payload = data + sizeof(struct sc_server_inmsg);
  340. int payload_len = data_len - sizeof(struct sc_server_inmsg);
  341. // report
  342. o->handler_message(o->user, peer_id, payload, payload_len);
  343. return;
  344. }
  345. int start_packet (ServerConnection *o, void **data, int len)
  346. {
  347. ASSERT(o->state >= STATE_WAITINIT)
  348. ASSERT(o->output_local_packet_len == -1)
  349. ASSERT(len >= 0)
  350. ASSERT(len <= SC_MAX_PAYLOAD)
  351. ASSERT(data || len == 0)
  352. // obtain memory location
  353. if (!BufferWriter_StartPacket(o->output_local_if, &o->output_local_packet)) {
  354. BLog(BLOG_ERROR, "out of buffer");
  355. return 0;
  356. }
  357. o->output_local_packet_len = len;
  358. if (data) {
  359. *data = o->output_local_packet + sizeof(struct sc_header);
  360. }
  361. return 1;
  362. }
  363. void end_packet (ServerConnection *o, uint8_t type)
  364. {
  365. ASSERT(o->state >= STATE_WAITINIT)
  366. ASSERT(o->output_local_packet_len >= 0)
  367. ASSERT(o->output_local_packet_len <= SC_MAX_PAYLOAD)
  368. // write header
  369. struct sc_header *header = (struct sc_header *)o->output_local_packet;
  370. header->type = htol8(type);
  371. // finish writing packet
  372. BufferWriter_EndPacket(o->output_local_if, sizeof(struct sc_header) + o->output_local_packet_len);
  373. o->output_local_packet_len = -1;
  374. }
  375. int ServerConnection_Init (
  376. ServerConnection *o,
  377. BReactor *reactor,
  378. BAddr addr,
  379. int keepalive_interval,
  380. int buffer_size,
  381. int have_ssl,
  382. CERTCertificate *client_cert,
  383. SECKEYPrivateKey *client_key,
  384. const char *server_name,
  385. void *user,
  386. ServerConnection_handler_error handler_error,
  387. ServerConnection_handler_ready handler_ready,
  388. ServerConnection_handler_newclient handler_newclient,
  389. ServerConnection_handler_endclient handler_endclient,
  390. ServerConnection_handler_message handler_message
  391. )
  392. {
  393. ASSERT(addr.type == BADDR_TYPE_IPV4 || addr.type == BADDR_TYPE_IPV6)
  394. ASSERT(keepalive_interval > 0)
  395. ASSERT(buffer_size > 0)
  396. ASSERT(have_ssl == 0 || have_ssl == 1)
  397. // init arguments
  398. o->reactor = reactor;
  399. o->keepalive_interval = keepalive_interval;
  400. o->buffer_size = buffer_size;
  401. o->have_ssl = have_ssl;
  402. if (have_ssl) {
  403. o->client_cert = client_cert;
  404. o->client_key = client_key;
  405. snprintf(o->server_name, sizeof(o->server_name), "%s", server_name);
  406. }
  407. o->user = user;
  408. o->handler_error = handler_error;
  409. o->handler_ready = handler_ready;
  410. o->handler_newclient = handler_newclient;
  411. o->handler_endclient = handler_endclient;
  412. o->handler_message = handler_message;
  413. // init socket
  414. if (BSocket_Init(&o->sock, o->reactor, addr.type, BSOCKET_TYPE_STREAM) < 0) {
  415. BLog(BLOG_ERROR, "BSocket_Init failed (%d)", BSocket_GetError(&o->sock));
  416. goto fail0;
  417. }
  418. // start connecting
  419. int res = BSocket_Connect(&o->sock, &addr, 1);
  420. if (res != -1 || BSocket_GetError(&o->sock) != BSOCKET_ERROR_IN_PROGRESS) {
  421. BLog(BLOG_ERROR, "BSocket_Connect failed (%d)", BSocket_GetError(&o->sock));
  422. goto fail1;
  423. }
  424. // be informed of connection result
  425. BSocket_AddEventHandler(&o->sock, BSOCKET_CONNECT, (BSocket_handler)connect_handler, o);
  426. BSocket_EnableEvent(&o->sock, BSOCKET_CONNECT);
  427. // set state
  428. o->state = STATE_CONNECTING;
  429. DebugError_Init(&o->d_err, BReactor_PendingGroup(o->reactor));
  430. DebugObject_Init(&o->d_obj);
  431. return 1;
  432. fail1:
  433. BSocket_Free(&o->sock);
  434. fail0:
  435. return 0;
  436. }
  437. void ServerConnection_Free (ServerConnection *o)
  438. {
  439. DebugObject_Free(&o->d_obj);
  440. DebugError_Free(&o->d_err);
  441. if (o->state > STATE_CONNECTING) {
  442. // allow freeing queue flows
  443. PacketPassPriorityQueue_PrepareFree(&o->output_queue);
  444. // free output user flow
  445. PacketPassPriorityQueueFlow_Free(&o->output_user_qflow);
  446. // free output local flow
  447. PacketProtoFlow_Free(&o->output_local_oflow);
  448. PacketPassPriorityQueueFlow_Free(&o->output_local_qflow);
  449. // free output common
  450. PacketPassPriorityQueue_Free(&o->output_queue);
  451. KeepaliveIO_Free(&o->output_keepaliveio);
  452. PacketStreamSender_Free(&o->output_sender);
  453. if (o->have_ssl) {
  454. PRStreamSink_Free(&o->output_sink.ssl);
  455. } else {
  456. StreamSocketSink_Free(&o->output_sink.plain);
  457. }
  458. // free output keep-alive branch
  459. PacketProtoEncoder_Free(&o->output_ka_encoder);
  460. SCKeepaliveSource_Free(&o->output_ka_zero);
  461. // free job
  462. BPending_Free(&o->start_job);
  463. // free input chain
  464. PacketProtoDecoder_Free(&o->input_decoder);
  465. PacketPassInterface_Free(&o->input_interface);
  466. if (o->have_ssl) {
  467. PRStreamSource_Free(&o->input_source.ssl);
  468. } else {
  469. StreamSocketSource_Free(&o->input_source.plain);
  470. }
  471. // free SSL
  472. if (o->have_ssl) {
  473. BPRFileDesc_Free(&o->ssl_bprfd);
  474. ASSERT_FORCE(PR_Close(o->ssl_prfd) == PR_SUCCESS)
  475. }
  476. }
  477. // free socket
  478. BSocket_Free(&o->sock);
  479. }
  480. int ServerConnection_IsReady (ServerConnection *o)
  481. {
  482. DebugObject_Access(&o->d_obj);
  483. return (o->state == STATE_COMPLETE);
  484. }
  485. int ServerConnection_StartMessage (ServerConnection *o, uint8_t **data, peerid_t peer_id, int len)
  486. {
  487. ASSERT(o->state == STATE_COMPLETE)
  488. ASSERT(o->output_local_packet_len == -1)
  489. ASSERT(len >= 0)
  490. ASSERT(len <= SC_MAX_MSGLEN)
  491. ASSERT(data || len == 0)
  492. DebugError_AssertNoError(&o->d_err);
  493. DebugObject_Access(&o->d_obj);
  494. uint8_t *packet;
  495. if (!start_packet(o, (void **)&packet, sizeof(struct sc_client_outmsg) + len)) {
  496. return 0;
  497. }
  498. struct sc_client_outmsg *msg = (struct sc_client_outmsg *)packet;
  499. msg->clientid = htol16(peer_id);
  500. if (data) {
  501. *data = packet + sizeof(struct sc_client_outmsg);
  502. }
  503. return 1;
  504. }
  505. void ServerConnection_EndMessage (ServerConnection *o)
  506. {
  507. ASSERT(o->state == STATE_COMPLETE)
  508. ASSERT(o->output_local_packet_len >= 0)
  509. DebugError_AssertNoError(&o->d_err);
  510. DebugObject_Access(&o->d_obj);
  511. end_packet(o, SCID_OUTMSG);
  512. }
  513. PacketPassInterface * ServerConnection_GetSendInterface (ServerConnection *o)
  514. {
  515. ASSERT(o->state == STATE_COMPLETE)
  516. DebugError_AssertNoError(&o->d_err);
  517. DebugObject_Access(&o->d_obj);
  518. return PacketPassPriorityQueueFlow_GetInput(&o->output_user_qflow);
  519. }